On Mon, Feb 23, 2009 at 4:33 PM, Dean Willis <[email protected]> wrote:

> So, what are the implications for the SIP world?

Well, for starters vendors need to make sure any UI that represents
"this call is secure" display can't be subject to the favicon.ico
trick some browsers have.  think:

  Call-Info: <http://evil.attacker.com/padlock.jpg>;purpose=icon

SIP UIs also need to ensure that they can't fall for other
display-name tricks, i.e:

  From: "HSBC Bank"
<sips:mybankmanager%40hsbc.co.uk%3e%20%20%20%20%20%20%20%20%20%20%[email protected]>;tag=xxx

(it would appear the phone on my desk will indeed fall for something like this)

The SSLstrip attack relies on a MITM being able to modify a HTTP
response *before* getting to the HTTPS page (i.e, rewriting the links
a user would normally click, such as "<a
href="https://login.hsbc.co.uk";>My Account</a>").

A parallel to this attack in SIP is if a SIPS URI is first learnt
through a non TLS requests, which upgrades to TLS and uses a UI hack
like the one above, or even redirect to a sips URI hosted on the
attackers server (resulting in a padlock, all be it the wrong one),
which then forwarded the call to le bank.  again, this is partially a
UI design issue, and we need to ensure that UAC vendors display who
the certificate has been issued to [1] as well at the identty of the
remote endpoint.

Luckily for us, the same sort of attack will be far harder in SIP once
DNSSEC is in place (if it ever is :)) in the end to end model, as we
use NAPTR for indicating the transport, this there is no risk of
rewriting the response, as it will come through TLS even when non sips
call in a "secured" domain;  HTTPS doesn't have this.  a User typing
in "[email protected]" will - at least in the end to end model -
result in a NAPTR RRset for hsbc.co.uk's SRV records and only TLS
transports (assuming a bank was sensible and only has TLS transports),
which results in another (secured by DNSSEC) SRV lookup lookup for
their proxies, which then is sent via TLS to them.

The worry comes when a user types "sip:[email protected]" which
goes over TCP/UDP (non TLS) to a service provider, which then could
return a 302 to sips:[email protected], as then we fall into the
same trap as the SSLstrip MITM attack.

In other words, a SIP call initiated over a non TLS transport can
never be "upgraded" (via, for example, a 3xx) to TLS without being
subject to this (albeit lack of user-awareness/UI design) attack.

 ~ Theo

1 - Although this has some issues too, obviously.

-- 
Theo Zourzouvillys
Chief Technical Officer
VoIP.co.uk

Sent from: Bicester Oxfordshire United Kingdom.
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to